A method, apparatus, and computer program product are provided for generating test packets to be used in developing network protocol devices. According to the method of the invention, a first computer system is provided that includes a packet shell generation facility. The packet generation facility includes a generic command language interface mechanism and a packet management function generator. Using the packet shell generation facility test packets are generated for use in testing various aspects of network protocol devices.

Patent
   5822520
Priority
Dec 26 1995
Filed
Dec 26 1995
Issued
Oct 13 1998
Expiry
Dec 26 2015
Assg.orig
Entity
Large
69
9
all paid
17. A computer system for creating test packets for use in testing network protocol devices, the computer system comprising:
a) a kernel portion;
b) a user portion;
c) a packet shell generation facility located in said user portion, said packet shell generator including a generic command language interface mechanism coupled with a packet management function generator, wherein the packet management function generator is protocol independent; and
d) at least one protocol device.
1. A computer program product comprising a computer usable medium having computer readable code devices embodied therein for generating test packets for simulating computer network communications, the computer program product comprising computer readable program code devices for providing a packet shell generation facility, including computer readable program code devices for providing a generic command language interface mechanism and a packet management function generator, the packet shell generation facility being network protocol independent.
5. A computer readable medium storing code devices executable for generating test packets for simulating computer network communications, the code devices including a packet shell generation facility that is operable with a plurality of network protocols, the packet shell generation facility comprising:
a generic command language interface mechanism that can interpret a plurality of different inputs, each of the plurality of different inputs being either generic to more than one network protocol or specific to one network protocol; and
a packet function generator that generates a test packet for a particular network protocol based on the inputs from the generic command language interpreter, wherein the packet function generator is operable to generate test packets for more than one network protocol.
6. A computer-implemented method for generating test packets for simulating computer network communications, the computer-implemented method comprising the steps of:
a) providing a packet shell generation facility that is protocol independent, the packet shell generation facility including a generic command language interface mechanism and a packet management function generator, and wherein the packet shell generation facility is operable with a plurality of network protocols;
b) providing at least one library of protocol-specific commands;
c) linking said packet management function generator to said library of protocol specific commands for at least one network protocol; and
d) generating a test packet using said packet shell generation facility by issuing commands to said generic command language interface to cause said packet management function generator to create packet data structures in accordance with said protocol specific commands located in said library.
16. A computer-implemented method for testing a protocol layer for coupling a first computer system to at least one remote computer system over a computer network, the computer-implemented method comprising the steps of:
a) providing a packet shell generation facility that is protocol independent the packet shell generation facility including a generic command language interface mechanism and a packet management function generator, said packet management function generator being operable with a plurality of network protocols;
b) providing a at least one library of protocol-specific commands;
c) linking said packet management function generator to said library of protocol specific commands for at least one network protocol; and
d) generating a test packet using said packet shell generation facility by issuing commands to said generic command language interface to cause said packet management function generator to create or modify packet data structures in accordance with said protocol specific commands located in said library; and
e) transmitting said test packet to said protocol device to be tested.
2. The computer program product of claim 1, further including computer program code devices for transmitting test packets created using said packet shell generation facility over a computer network.
3. The computer program product of claim 2, further including computer readable program code devices for at least one library of protocol-specific commands.
4. The computer readable program product of claim 3, wherein said library further includes program code devices for linking said library dynamically to said packet management function generator.
7. The method of claim 6, wherein said test packet is transmitted on a computer system upon which resides said packet shell generation facility.
8. The method of claim 6, wherein said test packet is transmitted to a remote computer system that is coupled with a first computer system upon which resides the packet shell generation facility.
9. The method of claim 6, wherein said test packet is transmitted to at least one network protocol device.
10. The method of claim 9, wherein said network protocol device is an actual device.
11. The method of claim 9, wherein said network protocol device is a virtual device.
12. The method of claim 6, wherein said library is linked dynamically to said packet management function generator.
13. The method of claim 6, including the step of modifying said test packet.
14. The method of claim 6, including the steps of creating a table in the test packet that references the data structures in the test packet and processing said data packet to update the status of said table.
15. The method of claim 14, wherein said test packet is created by modification of a previously generated test packet.
18. The computer system of claim 17, further comprising a computer network including at least one remote computer, and a network connection coupled with said computer system such that said computer system is capable of communicating with said remote computer.
19. The computer system of claim 17, wherein said packet management function generator is coupled with at least one library of protocol-specific commands.
20. The computer system of claim 19, wherein said library is linked dynamically to said packet function generator.
21. The computer system of claim 20, wherein said protocol device is located within said kernel and coupled therewith.
22. The computer system of claim 21, wherein said protocol device is a virtual device and is located in said user portion.
23. The computer system of claim 17, further including a test packet comprising at least one data segment representing a protocol device and a table including the identity and length of each data segment in said test packet.

A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.

1. The Field of the Invention

The present invention relates to computer networks and to computer network communications protocols. More specifically, the present invention provides methods and apparatus for developing and testing interactively computer network protocol stacks and for creating computer network communications packets having highly arbitrary properties.

2. The Relevant Art

The use of networked computers has virtually exploded in recent years. Computer networks have become very attractive for a number of reasons. First, networked computers facilitate communication between the users of the computers through technologies such as electronic mail (E-mail), and video conferences through local work stations. Second, computer networks have become extremely important for the dissemination and processing of data. Using computer networks, data can be located at individual sites for access and subsequent processing by many remote users. Third, there is growing interest in harnessing the computing power of several networked computers to perform individual computing tasks using technologies such as distributed processing. The use of computer networks through network structures such as the Internet has also facilitated "telecommuting", in which workers perform job tasks remotely using networked computers, which has had a tremendous impact on the workplace environment over the last five to ten years.

The successful networking of computer systems requires the use of protocols or agreements or sets of rules that define structures for communication between computers. For example, in order for two computers to communicate successfully each computer must beware in advance of the length (and time) of a bit, how to recognize the start of data transmission, and how to recover from errors in data transmission, in addition to the language of the transmission. Typically protocols are structured in layers. The lowest layer is typically concerned with the hardware aspects of the communication, handling issues such as the electrical and mechanical aspects of the connection of the computer to the network. Several middle layers handle the organization of data into well defined units such as frames, packets, and messages, and the transmission of those messages from the origin to the destination. The upper layers of the protocol typically handle the meaning of the message that is being forwarded, and include such protocols as file transfer protocols and electronic mail protocols. The employment and design of such protocols, e.g., TCP/IP and ISO OSI, are well known to those of skill in the computer network arts (Ralston 1993).

In order for a message generated on a local computer to travel across the network to one or more destination computers, the message must first traverse each of the above described protocol layers. Each layer comprises an interface which ensures that only those messages having the correct formatting and sequencing are handled by the layer. Messages that lack the correct formatting and/or ordering are thus rejected as being improper. In addition, the protocol has to protect itself from both the user and the network. It is highly undesirable for a user to make changes to the packets of information that are being sent over the network. In addition, the protocol must identify erroneous packets (e.g. damaged or fragmented packets). Thus, the generation of packets is strictly controlled by the protocols. Unfortunately the strict rules adhered to by protocols for the generation of packets makes testing new protocol stacks and communication between protocol layers extremely difficult. This is because there are few if any good methods for generating packets having arbitrary characteristics in order to test the interfaces between the various layers to detect flaws and inconsistencies in the design of either the interface or the particular layer being tested. Also, it is important in the testing and development of protocol stacks to understand how a "good" protocol stack will react to erroneous message packets.

Currently these sorts of tests are performed through the use of special purpose programs that specially create packets or sequences of packets. These specialized programs have to be created individually for each test being performed. Separate packet capture tools are then used to verify the results of the tests. These methods are extremely cumbersome, time consuming, expensive, and difficult to employ. As a result, less testing of new products is performed resulting in increased likelihood of failures. Thus, the creation of new protocols is a relatively inefficient process.

The present invention alleviates these problems by providing methods and apparatus for the generation and testing of packets having arbitrary characteristics. Using the method and apparatus of the invention packets of arbitrary type and character can be created through a extensible interactive packet language framework through which user-extensible packets can be generated for protocol development and testing. Thus it will be appreciated that the present invention provides a method for quickly and efficiently generating packets with which protocol stacks can be tested thereby facilitating the development of network communications tools.

In one aspect the present invention provides a computer-implemented method for generating test packets for simulating computer network communications. According to one embodiment of the method of the invention, a packet shell generation facility is provided that includes a generic command language interface mechanism and a packet shell function generator. At least one library of protocol-specific commands is also provided and linked to the packet shell function generator. A test packet is then generated using the packet shell generation facility by issuing commands to said generic command language interface to cause said packet shell function generator to create or modify packet data structures in accordance with said protocol specific commands located in said library. In one embodiment the packet shell is then transmitted on the computer system that includes the packet shell generation facility. In another embodiment, the test packet is transmitted to a remote computer system that is coupled with the first computer system.

In still another embodiment of the method of the invention, the test packet is transmitted to at least one network protocol device. The device may be an actual device or it may be a virtual device. In yet another embodiment, at, least one library of protocol-specific commands are provided in addition to the packet shell generation facility. These libraries can be coupled with the packet shell function generator in one embodiment and, more specifically, in another embodiment are linked dynamically to the packet shell function generator.

In another aspect, the present invention provides a computer system for creating test packets for use in testing network protocol devices. The computer system of the invention includes, in one embodiment, a kernel portion and a user portion. In addition, a packet shell generation facility is located in the user portion. The packet shell generation facility includes a generic command language interface mechanism that is coupled with a packet shell function generator. In addition, at least one protocol device is included with the computer system. In one embodiment, the computer system further comprises a computer network that includes at least one remote computer, the computer system of the invention being coupled with the computer network so that the remote computer can communicate with the above-described computer system. In still another embodiment, the packet shell function generator is coupled with at least one library of protocol specific commands.

In yet another embodiment, the present invention includes a computer program product that includes a computer usable medium having computer readable code devices embodied therein for generating test packets for simulating computer network communications. The computer program product provided by the present invention includes computer readable program code devices for providing a packet shell generation facility that includes a generic command language interface mechanism and a packet shell function generator. In one embodiment, the computer program product further includes computer program code devices for transmitting test packets created using the packet shell generation facility over a computer network. In another embodiment the computer program product of the invention includes computer program code devices for providing at least one library of protocol specific commands.

These and other aspects and advantages provided by the present invention will become apparent when the Description below is read in conjunction with the accompanying Drawings.

FIG. 1 is a schematic illustration of a computer system in accordance with the present invention.

FIG. 2 is an illustration of a layered computer network protocol as commonly implemented in current practice.

FIG. 3 is an illustration of the data structure of a packet in accordance with one embodiment of the present invention.

FIG. 4 is a flowchart illustrating a bootstrapping function in accordance with one embodiment of the present invention.

FIG. 5 is an illustration of a packet shell and dynamically linked libraries in accordance with one embodiment of the present invention.

FIG. 6 is an illustration of the employment of the packet shell of the invention to simulate the operation of a network protocol layer.

FIG. 7 is an illustration of the employment of the packet shell of the present invention to simulate the testing of multiple protocol layers.

FIG. 8 is an illustration of the employment of the packet shell of the present invention for generating test traffic.

FIG. 9 is an illustration of the employment of the packet shell of the present invention for simulating a computer network.

The present invention employs various process steps involving data stored in computer systems. These steps are those requiring physical manipulation of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It is sometimes convenient, principally for reasons of common usage, to refer to these signals as bits, values, elements, variables, characters, data structures, or the like. It should be remembered, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.

Further, the manipulations performed are often referred to in terms such as identifying, running, or comparing. In any of the operations described herein that form part of the present invention these operations are machine operations. Useful machines for performing the operations of the present invention include general purpose digital computers or other similar devices. In all cases, there should be borne in mind the distinction between the method of operations in operating a computer and the method of computation itself. The present invention relates to method steps for operating a computer in processing electrical or other physical signals to generate other desired physical signals.

The present invention also relates to an apparatus for performing these operations. This apparatus may be specially constructed for the required purposes, or it may be a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. The processes presented herein are not inherently related to any particular computer or other apparatus. In particular, Various general purpose machines may be used with programs written in accordance with the teachings herein, or it may be more convenient to construct a more specialized apparatus to perform the required method steps. The required structure for a variety of these machines will appear from the description given below.

In addition, the present invention further relates to computer readable media which include program instructions for performing various computer-implemented operations. The media and program instructions may be those specially designed and constructed for the purposes of the present invention, or they may be of the kind well known and available to those having skill in the computer software arts. Examples of computer readable media include, but are not limited to, magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROM disks; magneto-optical media such as floptical disks; and hardware devices that are specially configured to store and perform program instructions, such as read-only memory devices (ROM) and random access memory (RAM). Examples of program instructions include both machine code, such as produced by a compiler, and files containing higher level code that can be executed by the computer using an interpreter.

FIG. 1 at 100 shows a typical computer-based system in accordance with the present invention. Shown is a central processing unit 102 (CPU) which is coupled to memory devices including read only memory 104 (ROM) and random access memory 106 (RAM). As is well known in the art, ROM 104 acts to transfer data and instructions unidirectionally to the CPU and RAM 106 is used typically to transfer data and instructions in a bidirectional manner. A mass memory device 108 is also coupled bidirectionally to CPU 102 and provides additional data storage capacity. The mass memory device 108 may be used to store programs, data and the like and may take the form of a magnetic or paper tape reader or some other well known device (e.g., CD-ROM). It will be appreciated that the information retained within the mass memory device 108, may, in appropriate cases, be incorporated in standard fashion as part of RAM 106 in the form of virtual memory. CPU 102 is also coupled to one or more input/output devices 110 (I/O) which include, but are not limited to, devices such as video monitors, trackballs, mice, keyboards, microphones, touch-sensitive displays, transducer card readers, magnetic or paper tape readers, tablets, styluses, voice or handwriting recognizers, or other well-known input devices such as, of course, other computers. Finally, CPU 102 optionally can be coupled to a computer or telecommunications network using a network connection as shown generally at 112. The above-described devices and materials will be familiar to those of skill in the computer hardware and software arts (Herzog, 1996; Ralston 1993; Stone 1983; Martin 1989).

FIG. 2 at 200 illustrates a common computer network protocol architecture. In general, the architecture can be separated into two portions: a user portion 202 and a kernel portion 204. The user portion includes an Application 206 through which the user or machine generates the message to be sent across the network to one or more remote sites. Application 206 thus can be any software capable of creating a message for transmission across the computer network, e.g., electronic mail software.

Within kernel portion 204 are a number of layers which collectively format and physically transmit the message across the network. Typically, these layers include a session layer 208, a transport layer 210, a network layer 212, and a device layer (or device driver) 214. Each of these layers is well known to those of skill in the computing arts and is described, for example, in the ISO Standard Network Layering Model. Session layer 208 provides for the creation and destruction of the communication session in addition to information as to how the connection is to be made and error recovery is to be handled (e.g., whether the system is switched to another server in the event a first server is unavailable). Examples of Session layer function include indicating that a message is to be sent over the network and choosing a port to be used for the transmission.

Session layer 208 is in bidirectional communication with Application 206 and with Transport layer 210. In general, Transport layer 210 is responsible for operations such as retransmitting data and flow control (i.e. directing the remote sender to send data in a predetermined number of bytes). Examples of Transport layer functions include parsing data to be transmitted into portions as required by the protocol being used.

Transport layer 210 is in bidirectional communication with network layer 212 which network layer typically is responsible for routing messages to their destination. The Network layer functions typically include putting the address of the message's destination into the header of the message.

Network layer 212 is in bidirectional communication with Device layer 214 which typically provides the hardware interface between the computer system 100 and the network, and is responsible for taking the packet of information, formatting the data in the message in accordance with the requirement of the hardware being used, and transmitting the message physically onto the network. As indicated in the Figure, each of the layers is in bidirectional communication with the kernel 216, or operating system, of the local computer.

As described above, each of the layers shown in FIG. 2 includes an interface which selectively filters the signals, or "packets" that are handled by each layer. As used herein the term "packet" will be taken to mean any collection of information being handled by the network protocol layers. A "packet" can also mean a collection of binary data and control elements (including optional error control information) that are arranged in a specific format and switched and transmitted as a whole (Kurpis 1993). Typically, the interface for each layer is different. The generation of erroneous test packets to test each of the layers, the interfaces of the layers, and the interactions between the layers, is extremely difficult because of the rigid adherence to protocol specifications by packet generation software.

The present invention avoids these problems by providing a unique packet data structure in which data corresponding to each of the protocol layers being simulated is arranged in a serial fashion. In one embodiment, the data blocks are arranged such that the data representing the lower level layers come before the data blocks representing the higher level layers. In addition, each packet further comprises a table, the elements of which indicate the name of the layer and the byte offset in the packet of the data representing that layer. In one embodiment, the name END is provided for the table entry following the table entry for the last layer represented in the data structure.

One example of this type of packet data structure is shown in FIG. 3 at 300 which illustrates a packet 302 which, includes a packet data structure 304 and a packet table 312. In this embodiment, the arrangement of data in packet data structure 304 is such that the data for the lowest level layer (e.g., device layer 212 of FIG. 2) is the first block 306 of the data structure. This block is followed by a contiguous block of network data 308 which is followed in turn by a third contiguous block of transport data 310. In the illustrated embodiment, the device layer data comprises a contiguous block of data from bits 0 to 14, the network data comprises a contiguous block of information from bits 15 through 26, and the transport data block comprises a contiguous block of data from bits 27 through 48. However, it will be appreciated that the data blocks may vary in size arbitrarily. In addition, the blocks need not occupy contiguous space in the computer's memory, but can comprise disjoint memory segments.

Packet table 312 includes as elements the names of the protocol layer data blocks in addition the offset of each block in memory. If each data block occupies a continuous section of memory no additional information is required to specify the location of the data. However, in embodiments in which one or more blocks occupies disjoint memory segments, the packet table will further include the length of each segment in addition to its offset. The packet table also can comprise disjoint memory segments. The construction and manipulation of such data structures will be familiar to those of skill in the computer science arts.

The data structure described in FIG. 3 provides several important advantages. In particular, the size of each block can be determined implicitly by determining the location of the next element in the table. Such a structure is often a good approximation for most protocols. Also, the identity of each block can be determined readily by calling a function to read the table resident in the header of the packet. In one embodiment, the present invention includes such a function called DECODE() which takes as an argument the index of the layer in the header table. Thus, by calling the DECODE() function, the location and identity of each device layer represented in the packet can be determined.

It will be appreciated that such a structure avoids the problem commonly known in the computer science arts wherein network protocol layers make assumptions regarding the data structure of incoming packets. For example, network software using the TCP/IP protocol will often assume an IP data block immediately follows a TCP data block and "peek" inside the IP header to obtain necessary information that the IP header contains. Although this programming strategy works adequately in principal, if the packet being processed has been damaged during transmission (e.g., the packet has become fragmented) then the information being obtained from the supposed IP block is not reliable and unpredictable consequences can result. The data structure and DECODE() function provided by the present invention thus will be seen to obviate the need to make assumptions about the packet structure and will therefore provide more reliable communication between layers.

When a packet is created, the packet creator indicates the protocol name of the first layer of the packet. If the packet is subsequently modified so that a change to the order, number, or identities of the layers represented in the data structure might result, then a bootstrapping function is called to update the header of the data packet. The operation of the bootstrapping function is illustrated at 400 in FIG. 4. Beginning at step 402 the variable layer indicating the table index is set to 0 at step 404. Next, at step 406, the variables next and offset are set equal to the function DECODE(layer). At step 408 the value of the header table element Table[layer+1] is set equal to (next, offset). At step 410 a determination is made as to whether the variable next is equal to the value END. If the result of the query at step 410 is negative, then the variable layer is incremented at step 412 and the loop returns to step 406. Otherwise the process ends at step 414.

FIG. 5 at 500 illustrates a facility for generating the above-described packets. Shown at 502 is a packet generation shell which comprises various packets 504, 506 and 508 as described above. One or more of the packets are in bidirectional communication with packet management function generator 510 which packet management function generator is in turn in bidirectional communication with generic command language interpreter 512 (see Ralston 1993). In one embodiment, interpreter 512 is a Tool Command Language (TCL) interpreter. According to one embodiment of the invention the TCL interpreter provides an interface for a user to manipulate one or more packets through packet management function generator 510. Packet management function generator 510 includes various packet management functions such as the above-described DECODE() function, in addition to other management functions such as an ALLOCATE() function for creating packets and a FREE() function for releasing memory assigned to packets. The design and construction of the packet management function generator will be familiar to those having skill in the computer science arts.

In another embodiment, packet management function generator 510 is in bidirectional communication with one or more dynamically linked libraries (DLLs) shown generally at 514. The individual DLLs 516, 518 and 520 each comprise the instructions typical for a given protocol. Thus, for example, DLL 516 could include the instructions for the TCP protocol, DLL 518 might include the instructions for the OSI TP4 protocol, and DLL 520 might include the instructions for the IPX protocol. In one embodiment, each of the libraries contains the above-described DECODE() function so that if any library is used to modify a packet in such a way as to potentially alter the table describing the data structure of the packet, the table can be appropriately updated using the above-described bootstrap function. In another embodiment, each of the libraries includes primitives to read the header table, copy data from one packet to another, set fields in the table, query a packet for information such as the packet's length, send and receive packets, and SET and GET commands to build packets. These and other primitives will be familiar to those of skill in the computer science arts. An exemplary set is provided in the accompanying document, entitled "Primitive Examples", which document is herein incorporated by reference in its entirety.

FIGS. 6-9 illustrate examples of the employment of the above-described packet shell generation facility to the simulation of various aspects of communication on a computer network, and, in particular, to generate test packets to evaluate the performance of various network protocol layers. These examples are intended for the sole purpose of describing the present invention and should not be considered as limiting the scope of the invention in any way.

FIG. 6 at 600 illustrates the use of the packet shell generation facility of the present invention to test an individual network protocol layer. At the user portion of the computer system, i.e., that portion of the computer system comprising the user interface and applications, which includes a packet shell 602. Packet shell 602 comprises various testing modules, or virtual layers, representing the network protocol layers not being tested. In the present example, these layers include a virtual session layer 606, a virtual transport layer 608, and a virtual device layer 610 which simulate the functions of actual network protocol layers as described above. Each of the virtual layers is coupled bidirectionally with packet shell generation facility 604. The virtual layers are created using primitives contained in the protocol-specific libraries. Thus, testing modules can be created corresponding to any desired communications protocol.

The kernel comprises a first relay module 612, the protocol layer being tested 614 (here, the network protocol layer), and a second relay layer 616. Each of the relay layers functions to convey information to and from the layer in the kernel being tested to the appropriate virtual layers in the testing module in the user portion of the computer system. The first relay module is coupled bidirectionally with the virtual layer in the testing module corresponding to the network protocol layer that resides "above" the layer being tested. The second relay module is coupled bidirectionally with the virtual layer corresponding to the network protocol layer that resides "below" the layer being testing. In the present example, since the network protocol layer in being tested, the first relay module in coupled with the transport layer, and the second relay module is coupled bidirectionally with the device layer.

In operation, the virtual layers simulate the passage of a test packet through one or more protocol layers to the layer being tested. The response of the layer being tested to the test packet is returned by the second relay module through the virtual layer "beneath" the layer being tested to the packet shell generation facility. Thus, using the packet shell generation facility packets of arbitrary character and composition can be used to test the response of the layer being tested. The layer under test can be modified as necessary and re-tested without delays arising from the creation of specific testing software to evaluate each revision. Also, the architecture provided by the present invention makes testing of any layer straightforward since the libraries can be used to generate testing modules in a highly efficient manner. Again, the effort of creating individual testing programs is reduced.

FIG. 7 at 700 illustrates the testing of multiple network protocol layers. In accordance with the testing of a single layer described above, the packet shell generation facility is used to create virtual layers. Thus, as seen in the Figure, packet shell 702 includes a virtual application layer 704, a virtual session layer 706, a virtual transport layer 706, and a virtual device layer 708. Each of these virtual layers is in bidirectional communication with packet shell generation facility 710.

Residing in the kernel are the first relay module 712, transport layer 714, network layer 716, and second relay module 718. As described above, virtual session layer 706 is in bidirectional communication with the first relay module and virtual device layer is 708 is in bidirectional communication with the second relay module. Using the packet shell generating facility, packets are constructed as described above and sent using the first relay module through the transport and network layers. The responses from these layers is then returned to the packet shell generation facility from the virtual device layer via the second relay module. It will be appreciated that such an arrangement allows for testing interactions among various network protocol layers.

FIG. 8 at 800 illustrates the use of the packet shell generation facility provided by the present invention to generate test traffic over a computer network. In the user portion of the computer system, packet shell generation facility 802 is in bidirectional communication with virtual application layer 804, virtual session layer, virtual transport layer 806, and virtual network layer 808. In the kernel portion of the computer system reside relay module 810 and device driver 812. Device driver 812 is bidirectional communication with one or more remote computers such as shown at 814 over a computer network 816 (e.g., an ethernet network).

In this exemplified embodiment of the present invention, the packet shell generation facility is used to generate test packets using the virtual network protocol layers as described above. These packets are relayed to the device layer via the relay module and sent over the network to the remote computer(s). The progress and effect of the test packets can be monitored and evaluated using standard techniques. In addition to the embodiment shown in FIG. 8, other network protocol layers can be located in the kernel so that only the effects of specific network layers can be evaluated.

FIG. 9 at 900 is an illustration of a virtual network, useful, e.g., simulating the interactions among all layers of a network protocol. In this exemplary application of the present invention, packet shell generating facility 902 is in bidirectional communication with virtual application layer 904, virtual session layer 906, virtual transport layer 908, virtual network layer 910, and virtual device layer 912.

In one embodiment, the packet shell generation facility is capable of being coded to simulate the kernel framework using, for example, the "Streams" framework which can be used to simulate the Solaris® operating system kernel (available from Sun Microsystems of Mountain View, Calif.). An example of one set of Streams commands is provided in document, entitled "Stream Command Examples", which document is herein incorporated by reference in its entirety. In one embodiment, the packet shell generation facility is used to simulate only the interfaces between network protocol layers in addition to the interfaces between the kernel and the network protocol layers to simulate and monitor thereby the network traffic between layers. It will be appreciated that real code and simulation can be combined to any degree providing an wide range of simulation and testing capabilities.

Although the foregoing invention has been described in some detail for purposes of clarity of understanding, it will be apparent that certain changes and modifications may be practiced within the scope of the appended claims.

The following materials are incorporated herein by reference in their entirety and for all purposes.

1. Ralston, Anthony, and Reilly, Edwin D. 1993. Encyclopedia of Computer Science. Van Norstrand Reinhold.

2. Herzog, James H. 1996. Design and Organization of Computing Structures. Franklin, Beedle & Associates, Inc.

3. Stone, Harold S. 1983. Microcomputer Interfacing. Addison Wesley.

4. Martin, James, and Chapman, Kathleen K. 1989. Local Area Networks: Architectures and Implementations. Prentice Hall.

5. Kurpis, Gediminas P., and Booth, Christopher J. 1993. The New IEEE Standard Dictionary of Electrical and Electronics Terms. Institute of Electrical and Electronics Engineers, Inc.

6. Accompanying document, Primitive Examples.

7. Accompanying document, Stream Command Examples.

/* Q(#)Language 1.5 */

Version 2 of the packet shell . . .

The language consists of primitives in three classes: per-protocol, protocol layer operations, and miscellaneous.

Identifiers used:

ID: A unique text string to identify a connection end-point. PROTO: The name of a supported "protocol" PRLAYER: The protocol and/or layer indication which identifies the component of a packet to be operated on. This string has one of the forms:

PROTO

PROTO:INDEX

INDEX

Where index is a non-negative integer. The first form will work only if only one occurrence of the indicated protocol exists within the packet. If two instances of a protocol are layered within a packet a zero-based index is used. For example:

ip :1

Refers to the second IP layer in a packet, perhaps in an ICMP packet which encloses a second IP header. `ip:0` refers to the first IP layer in such a packet.

If only an index is given, then whatever protocol is found at that layer is operated on.

Note that PROTO may be the string `end` which indicates the current end of packet marker. It can be used to indicate "append to the end of this packet". PROTO may also be the string `all`, which means the entire packet buffer is to be selected, if appropriate for the operation specified.

TIMEOUT: The parameter passed to a poll system call indicating whether to wait indefinitely, for a limited period of time, or only if the operation can be done now.

OP: Protocol end-point operation. The list of valid operations is a

function of the protocol layer. For example, an IP end-pont might

have the operations `send` and `recv` to send and receive IP packets.

Per-Protocol Operations

popen PROTO ID [proto-specific arguments]

Open a communications end-point named by the string ID, communicating with the "base" protocol PROTO. Any additional arguments are determined by the protocol itself. For example, popen leO ethernet /dev/le 0 0×800

might specify open the ethernet protocol, on /dev/le, attach to unit 0, SAP 0×800.

pclose PROTO ID [proto-specific arguments]

Close a communications end-point. Mainly this command releases resources, closes files, etc. associated with the end-point.

ID.OP [proto-specific arguments]

Invoke the protocol defined operation on the end-point identified by ID. The protocol-specific arguments are passed to the function provided by the protocol to implement the operation.

pinit PROTO PNAME [proto-specific arguments]

Create a packet, specifying PROTO as the "lowest level" protocol to be used. The protocol indicated supplies a packet buffer of a length expected to be "convenient". Additional optional arguments are made available to that protocol's pinit routine.

pfree PNAME [proto-specific arguments]

Free any resources, etc. associated with this packet variable. Mainly frees up the memory associated with the packet.

pset PNAME PRLAYER proto-specific arguments

Set a protocol element in the packet named by PNAME. PRLAYER specifies the protocol layer to be set. The format of the rest of the options are determined by the protocol itself.

pget PNAME PRLAYER protospecific arguments

Get a protocol element in the packet named by PNAME. It works similar to pset, but returns a string rather than sets a value.

plist PNAME [PLAYER]

List a summary of packet PNAME, the component indicated by PLAYER. If PLAYER is omitted, return a `plist` operation for each layer in turn, one per line.

Protocol Layer Operations

To help understand these commands, the packet shell keeps a table which decodes the current state of each packet buffer. It consists of: (protocol name, offset) and is terminated by the special entry: ("end", offset)

which marks the end of a packet. (Which may be short of the buffer the packet is actually stored in.) It is convenient to be able to query this table for a packet. The commands below provide this information to the user.

pcopy PNAME `/` PRLAYER PNAME1 `/` PRLAYER1 [PNAME2 `/` PRLAYER2]*

Copy into the packet PNAME beginning at layer PLAYER from packet PNAME1 layers PRLAYER1, and so on, for each packet name/ layer specifier indicated. For example suppose packet `ippckt` contains an IP packet, and packet `icmp` contains an IP header, and an ICMP packet. An IP header from ippckt can be appended to icmp with:

pcopy icmp/end ippckt/ip

poffset PNAME PRLAYER

Return the offset field, for packet PNAME, of the layer indicated by PLAYER. `poffset PNAME end` returns the current length of the packet.

pproto PNAME PRLAYER

Return the protocol name for packet PNAME, indicated by PRLAYER. Note that this is most commonly expected to be used in forms like:

proto PNAME 0

to return the protocol name of the first layer of the packet.

plen PNAME PRLAYER [<length>]

Return the length of the protocol layer PRLAYER in the packet PNAME. If a value is present, then the length of that segment of the packet is changed to the indicated size, in bytes.

pcast PNAME PRLAYER PROTO

Modify the indicated PRLAYER to be interpreted as protocol "PROTO". This is a way to type cast a packet to be interpreted a specific way. For example, if you have a DLPI protocol, you can use this to force the payload of DLPI primitives to be interpreted as ethernet or FDDI. ptbl PNAME

Dump the current packet table contents, showing the name and offset of all protocol layers imbedded in the packet.

Miscellaneous

passert EXPR TEXT

For test writers: Evaluate the expression. If it isn't true, report on stderr the text TEXT, and stop execution of the current script.

pread PNAME TYPE [PRLAYER:]OFFSET [LEN]

Raw packet read. Emits the hex representation of the indicated portion(s) of the named packet. If present, PRLAYER indicates that the offset should be interpreted relative to that protocol layer in the packet. If LEN is present, the indicated number of elements is dumped. TYPE can be `b`, `w` or `l` for 8, 16, or 32 bit quantities respectively.

pwrite PNAME TYPE [PRLAYER:]OFFSET VALUE [VALUE . . . ]

The opposite of pread in that pwrite modifies the indicated bits of the packet.

Streams Reference Manual

popen streams <ep-name> /kernel/strmod/ldterm

Open a streams end-point from the indicated module to <ep-name>.

ldl.strop open [outpkt]→"stopped kmem-- zalloc Oxbc sleep"

Events Return

status {stopped,finished}

stop cause {allocb, canput, canputnext, bcanput, bcanputnext, bufcall, copyb, dupb, copymsg, dupmsg, delay, esballoc, freeb, freemsg, kmem-- alloc, kmem-- zalloc, kmem-- free, pullupmsg, putnext, exit, qwait, qwait-- sig}

cause specific arguments

Outpkt, if present, is the packet buffer into which the resulting treams message is written, if any is issued. If outpkt is not present, and a message is written it is discarded.

ldl.cont [wakeup] <integer> [outpkt]

Continue the event currently stopped on that stream. If the optional string "wakeup" is present, then resume the sleeping thread, if qwait-- sig, kmem-- alloc(KM-- SLEEP), etc. pushed aside an event thread. The integer values is interpreted as true or false by the event handler which is being resumed, and used to indicate whether the request should succeed or fail, if this is meaningful.

ldl.strop wput inpkt [outpkt]

ldl.strop rput inpkt [outpkt]

ldl.strop wsrv [outpkt]

ldl.strop rsrv [outpkt]

ldl.strop bufcall <id> [outpkt]

ldl.strop close [outpkt]

IPv4 Reference Manual

ip.a2h <address>

Take numeric form of address and return the host name for that address. Numeric values are in host byte order.

ip.h2a <hostname>

Translate hostname into numeric IP address. Returns it as a integer in host byte order.

ip.src <ip-address>

Take the hostname, dotted quad, or host byte order integer form of an IP address, and set that IP address as the default source address when packets are initialized.

ip.dst <ip-address>

As ip.src, but sets the destination address.

popen ip <ep-name> <path>

Opens the network interface corresponding to <path>, and attaches it to end point named <ep-name>.

pclose ip <ep-name>

Close the indicated end-point.

pinit ip <pkt>

Initialize a new packet buffer named <pckt>. The initialization sets the IP header length to 5, the version to 5, type of service to 0, the id field to a monotonically increasing value, offset to zero, time-to-live to 40, protocol to TCP(6), and the source and destination addresses to zero. If a different value is supplied with ip.src or ip.dst, that value is used instead of zero.

pfree <pkt>

Free the indicated packet buffer.

pget <pkt> ip dst

pget <pkt> ip src

pget <pkt> ip proto

pget <pkt> ip len

pget <pkt> ip sum

pget <pkt> ip hlv

pget <pkt> ip tos

pget <pkt> ip id

pget <pkt> ip off

pget <pkt> ip ttl

Fetch the indicated fields from the indicated packet.

pset <pkt> ip dst <host>

pset <pkt> ip src <host>

pset <pkt> ip proto <protocol>

pset <pkt> ip len <length>

pset <pkt> ip sum <sum>

pset <pkt> ip hlv <integer>

pset <pkt> ip tos <integer>

pset <pkt> ip id <integer>

pset <pkt> ip off <integer>

pset <pkt> ip ttl <integer>

Set the indicated fields in the indicated packet.

<ep-name>.send <pkt>

Send the indicated IP packet through the indicated end-point name.

<ep-name>.recv <pkt>

Receive a packet through the indicated end-point.

IPv6 Reference Manual

ip6.a2h <address>

Convert the given IPv6 address to a hostname.

ip6.h2a <hostname>

Convert the hostname to an IPv6 address.

ip6.src <hostnameladdress>

Set the default source address to be used when packets are pinitted.

ip6.dst <hostnameladdress>

Set the default destination address to be used when packets are pinitted.

popen ip6 <ep-name> <path-to-interface>

Open the indicated interface, and attach it to the IPv6 end-point

name indicated.

pclose ip6 <ep-name>

Close the indicated IPv6 end-point.

pinit ip6 <pktname>

Create a default IPv6 header as the indicated packet.

pfree ip6 <pktname>

Free the indicated packet.

pget <pkt> ip6 dst

pget <pkt> ip6 src

pget <pkt> ip6 proto

pget <pkt> ip6 len

pget <pkt> ip6 v

pget <pkt> ip6 flow

pget <pkt> ip6 ttl

Return the indicated field from the IPv6 packet.

pget <pkt> ip6 dst <address>

pget <pkt> ip6 src <address>

pget <pkt> ip6 proto <protocol>

pget <pkt> ip6 len <value>

pget <pkt> ip6 v <value>

pget <pkt> ip6 flow <value>

pget <pkt> ip6 ttl <value>

Set the indicated field.

plist <pkt> ip6

List the packet.

<ep-name>.send <pkt>

<ep-name>.recv <pkt>

Send or receive the indicated packet.

ICMP for IPv6

pinit icmp6 <pkt>

Create a icmp6 packet variable.

pfree icmp6 <pkt>

Free the indicated packet.

pget <pkt> icmp6 type

pget <pkt> icmp6 code

pget <pkt> icmp6 cksum

pget <pkt> icmp6 wordl

pget <pkt> icmp6 target

pget <pkt> icmp6 target-ether

pget <pkt> icmp6 source-ether

Return the indicated fields from an ICMPv6 packet. Note that target-ether refers to the link layer destination address option.

The source-ether refers to the link layer source address option. Target refers to the IPv6 target address. Both `-ether` fields apply to router/neighbor solicitation packets.

The code currently supports only having one option, and the icmp6 must be resized by hand to make room for the option.

Wordl refers to the "icmp-- void" member in the icmp structure--the first full word after the type/code word.

7

pset <pkt> icmp6 type <type-nameltype-value>

pset <pkt> icmp6 code <integer>

pset <pkt> icmp6 cksum <integer>

pset <pkt> icmp6 cksum

pset <pkt> icmp6 wordl <integer>

pset <pkt> icmp6 target <IPv6-address>

pset <pkt> icmp6 target-ether <ether-address>

pset <pkt> icmp6 source-ether <ether-address>

Set the indicated fields in an ICMPv6 packet. Type-name can be any of the strings:

unreachable

packet too big

time exceeded

parameter problem

echo request

echo reply

group query

group report

group term

router solicitation

router advertisement

neighbor solicitation

neighbor advertisement

At this time no string values are accepted for the code field.

Note that the psetting the cksum without an argument causes the correct checksum to be computed and placed in the cksum field of the packet.

The target-ether and source-ether refer to options to neighbor discovery ICMP6 messages. The code currently supports only having one option, and the icmp6 must be resized by hand to make room for the option. (Use plen for this.)

Wordl refers to the "icmp-- void" member in the icmp structure--the first full word after the type/code word.

plist <pkt> icmp6

Summarize an ICMPv6 packet.

Ethernet Protocol

Access to the ethernet is provided by the `ether` protocol.

popen ether <end-point> <device-path> [<filter>]

Open a DLPI ethernet device found at <device-path> and attach it to the indicated communications end-point. If the optional <filter> is present, it is a snoop-syntax filter expression which limits which packets are seen by the "recv" primitive for this end-point. Normally all packets are seen.

pclose ether <end-point>

Close a previously popented ethernet end-point.

ether.src <ether-address>

Set the default source ethernet address for packets.

ether.dst <ether-address>

Set the default destination ethernet address for packets.

pinit ether <pkt>

Initialize an ethernet packet variable. The source and destination ether addresses are initialized at creation to the default values. Those values must be set with ether.src and ether.dst commands.

pget <pkt> ether src

pget <pkt> ether dst

pget <pkt> ether type Return the indicated fields in the ethernet header.

pset <pkt> ether src <ether-address>

pset <pkt> ether dst <ether-address>

pset <pkt> ether type <ether-type>

Set the ethernet field as indicated. The symbolic names "ip", "arp", and "ipv6" are recognized for the ether-type field, or it can be specified by an integer.

<end-point>.send <pkt>

Send the ethernet packet indicated.

<end-point>.recv <pkt>

Receive the next packet from the end-point indicated.

Parker, Steven D.

Patent Priority Assignee Title
11323354, Oct 09 2020 KEYSIGHT TECHNOLOGIES, INC. Methods, systems, and computer readable media for network testing using switch emulation
11388081, Mar 30 2021 Keysight Technologies, Inc Methods, systems, and computer readable media for impairment testing using an impairment device
11398968, Jul 17 2018 Keysight Technologies, Inc Methods, systems, and computer readable media for testing virtualized network functions and related infrastructure
11405302, Mar 11 2021 Keysight Technologies, Inc Methods, systems, and computer readable media for network testing using configurable test infrastructure
11483227, Oct 13 2020 KEYSIGHT TECHNOLOGIES, INC. Methods, systems and computer readable media for active queue management
11483228, Jan 29 2021 Keysight Technologies, Inc Methods, systems, and computer readable media for network testing using an emulated data center environment
11490432, May 28 2021 T-Mobile USA, Inc Unified query tool for network function virtualization architecture
11509704, May 28 2021 T-Mobile USA. Inc. Product validation based on simulated enhanced calling or messaging communications services in telecommunications network
11546243, May 28 2021 T-Mobile USA, Inc Unified interface and tracing tool for network function virtualization architecture
11729087, Dec 03 2021 Keysight Technologies, Inc Methods, systems, and computer readable media for providing adaptive background test traffic in a test environment
11765068, Dec 22 2021 KEYSIGHT TECHNOLOGIES, INC. Methods, systems, and computer readable media for programmable data plane processor based traffic impairment
11770323, May 28 2021 T-Mobile USA, Inc. Unified interface and tracing tool for network function virtualization architecture
11811844, May 28 2021 T-Mobile USA, Inc. Product validation based on simulated enhanced calling or messaging communications services in telecommunications network
11849492, May 28 2021 T-Mobile USA, Inc. Unified query tool for network function virtualization architecture
6581169, Dec 08 1999 Inventec Corporation Method and device for automatic computer testing on a plurality of computers through a local area network
6678734, Nov 13 1999 Rambus Inc Method for intercepting network packets in a computing device
6873600, Feb 04 2000 AT&T Corp Consistent sampling for network traffic measurement
6880027, Sep 09 1999 Renesas Electronics Corporation System and method of evaluating universal serial bus function
7020573, Jan 12 2004 Microsoft Technology Licensing, LLC Enhanced testing for compliance with universal plug and play protocols
7181508, Nov 09 2000 Oki Data Americas, Inc. System and method for communicating, monitoring and configuring a device operatively connected to a network
7266490, Dec 28 2000 UNWIRED BROADBAND, INC Apparatus and method for connecting hardware to a circuit simulation
7278061, Oct 08 2002 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Building packets of data for testing a communication network
7296289, Mar 08 1999 Kabushiki Kaisha Toshiba Setting or changing an access condition for an access management apparatus and method of a portable electronic device
7346075, Feb 25 2000 Meta Platforms, Inc Portable networking interface method and apparatus for distributed switching system
7424384, Jan 12 2004 Microsoft Technology Licensing, LLC Enhanced testing for compliance with universal plug and play protocols
7480311, Feb 25 2000 Meta Platforms, Inc Portable networking interface method for distributed switching system
7519527, Oct 31 2005 International Business Machines Corporation Method for a database workload simulator
7539609, Feb 23 2000 Tektronix, Inc. Creation of a protocol stack
7587505, Jul 06 2001 KYNDRYL, INC Data communication method, data communication system, and program
7596484, Nov 15 2000 Harris Corporation Network node emulator and method of node emulation
7603266, Sep 19 2003 Microsoft Technology Licensing, LLC Generic emulator of devices in a device communications protocol
7616568, Nov 06 2006 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Generic packet generation
7627669, May 21 2003 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Automated capturing and characterization of network traffic using feedback
7684338, Dec 06 2000 Tektronix, Inc. Circuit arrangement for testing a communication system
7702764, Jan 30 2004 Cisco Technology, Inc. System and method for testing network protocols
7711001, Feb 25 2000 Meta Platforms, Inc Portable networking interface method and apparatus for distributed switching system
7835897, Mar 28 2000 UNWIRED BROADBAND, INC Apparatus and method for connecting hardware to a circuit simulation
7840664, May 21 2003 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Automated characterization of network traffic
8046720, Dec 10 2002 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Graphical system and method for editing multi-layer data packets
8086660, May 21 2004 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Distributed data model
8121148, Mar 24 2005 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Protocol stack using shared memory
8135807, Sep 18 2007 The Boeing Company Packet generator for a communication network
8160863, Mar 28 2000 UNWIRED BROADBAND, INC System and method for connecting a logic circuit simulation to a network
8195442, Mar 28 2000 UNWIRED BROADBAND, INC Use of hardware peripheral devices with software simulations
8233399, Nov 06 2006 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Generic packet generator and method
8359377, Apr 30 2001 Hewlett Packard Enterprise Development LP Interface for automated deployment and management of network devices
8380481, Mar 28 2000 UNWIRED BROADBAND, INC Conveying data from a hardware device to a circuit simulation
8537839, Aug 30 2010 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Traffic generator with dynamic MPLS label assignment
8649271, Jan 25 2010 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Testing network equipment
8649395, Mar 24 2005 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Protocol stack using shared memory
8751946, Apr 05 2006 International Business Machines Corporation Enhanced display of properties for a program object
8781785, Nov 25 2008 Seiko Epson Corporation Information processing method, and recording medium and information processing apparatus therefor
8812556, Apr 06 2006 International Business Machines Corporation Storing modification data for recreating modifications
8914432, Oct 01 2001 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Real world traffic
8918682, Nov 14 2012 Altera Corporation Methods for testing network circuitry
8972929, Mar 31 2005 International Business Machines Corporation Generic user input for GUI framework
9049146, Oct 22 2008 Accenture Global Services Limited Automatically connecting remote network equipment through a graphical user interface
9172647, Apr 25 2013 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Distributed network test system
9191301, Oct 01 2001 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Real world traffic
9210050, Jul 09 2009 CenturyLink Intellectual Property LLC System and method for a testing vector and associated performance map
9432394, Mar 16 2015 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Methods, systems, and computer readable media for converging on network protocol stack vulnerabilities using fuzzing variables, vulnerability ratings and progressive convergence
9489488, Sep 23 2011 Roche Diabetes Care, Inc Protocol independent interface supporting general communications interface debugging and testing tool
9819551, Nov 20 2013 ARISTA NETWORKS, INC Systems and methods for testing networks with a controller
9917924, Mar 16 2015 KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD Methods, systems, and computer readable media for simplistic visual representation of complex interdependent network protocol fields for network protocol fuzzing and graphical framework for reporting instantaneous system level progress
D522587, Sep 29 2004 Kabushiki Kaisha Wiz Portable liquid-crystal game machine
D526025, Sep 17 2003 Wiz Co. Ltd. Portable liquid crystal game machine
D526026, Sep 17 2003 Wiz Co. Ltd. Memory case for portable liquid crystal game machine
D527053, Sep 17 2003 Wiz Co. Ltd. Memory for portable liquid crystal game machine
RE42227, Mar 28 2000 UNWIRED BROADBAND, INC Apparatus and method for connecting hardware to a circuit simulation
Patent Priority Assignee Title
5285199, Jan 28 1991 Method and apparatus for in-band data transmission
5410535, Jul 02 1992 ENTERASYS NETWORKS, INC Automatic selection of an interface for ethernet stations
5418793, Jun 22 1993 AT&T IPM Corp Method and apparatus for testing a complex entity
5446736, Oct 07 1993 SAMSUNG ELECTRONICS CO , LTD Method and apparatus for connecting a node to a wireless network using a standard protocol
5481735, Dec 28 1992 Apple Inc Method for modifying packets that meet a particular criteria as the packets pass between two layers in a network
5509006, Apr 18 1994 Cisco Technology, Inc Apparatus and method for switching packets using tree memory
5530703, Sep 23 1994 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Remote communication server with automatic filtering
5710908, Jun 27 1995 Canon Kabushiki Kaisha Adaptive network protocol independent interface
EP463764A2,
/////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Dec 26 1995Sun Microsystems, Inc.(assignment on the face of the patent)
Apr 12 1996PARKER, STEVEN D Sun Microsystems, IncASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0080040969 pdf
Feb 12 2010ORACLE USA, INC Oracle America, IncMERGER AND CHANGE OF NAME SEE DOCUMENT FOR DETAILS 0372700107 pdf
Feb 12 2010Sun Microsystems, IncOracle America, IncMERGER AND CHANGE OF NAME SEE DOCUMENT FOR DETAILS 0372700107 pdf
Feb 12 2010Oracle America, IncOracle America, IncMERGER AND CHANGE OF NAME SEE DOCUMENT FOR DETAILS 0372700107 pdf
Date Maintenance Fee Events
Mar 28 2002M183: Payment of Maintenance Fee, 4th Year, Large Entity.
Mar 21 2003ASPN: Payor Number Assigned.
Mar 17 2006M1552: Payment of Maintenance Fee, 8th Year, Large Entity.
Apr 08 2010M1553: Payment of Maintenance Fee, 12th Year, Large Entity.


Date Maintenance Schedule
Oct 13 20014 years fee payment window open
Apr 13 20026 months grace period start (w surcharge)
Oct 13 2002patent expiry (for year 4)
Oct 13 20042 years to revive unintentionally abandoned end. (for year 4)
Oct 13 20058 years fee payment window open
Apr 13 20066 months grace period start (w surcharge)
Oct 13 2006patent expiry (for year 8)
Oct 13 20082 years to revive unintentionally abandoned end. (for year 8)
Oct 13 200912 years fee payment window open
Apr 13 20106 months grace period start (w surcharge)
Oct 13 2010patent expiry (for year 12)
Oct 13 20122 years to revive unintentionally abandoned end. (for year 12)